Groups Similar Look up By Text Browse About

Similar articles
Article Id Title Prob Score Similar Compare
209527 ZDNET 2021-6-9:
FBI touts arrest of hundreds thanks to fake app
1.000 Find similar Compare side-by-side
209525 ARSTECHNICA 2021-6-8:
FBI sold phones to organized crime and read 27 million “encrypted” messages
0.781 0.653 Find similar Compare side-by-side
209388 THEVERGE 2021-6-8:
The FBI secretly launched an encrypted messaging system for criminals
0.594 0.632 Find similar Compare side-by-side
209647 ZDNET 2021-6-8:
How the FBI and AFP accessed encrypted messages in TrojanShield investigation
0.138 0.523 Find similar Compare side-by-side
209646 ZDNET 2021-6-8:
AFP used controversial encryption laws in its 'most significant operation in policing history'
0.010 0.461 Find similar Compare side-by-side
209642 ZDNET 2021-6-7:
After DOJ arrest of Latvian Trickbot coder, experts highlight public-private efforts to tackle cybercrime
0.457 Find similar Compare side-by-side
209783 ZDNET 2021-6-11:
Feds strike Slilpp, a marketplace for flogging initial access credentials
0.007 0.443 Find similar Compare side-by-side
209596 ZDNET 2021-6-7:
‘Majority’ of ransom paid by Colonial Pipeline seized and returned by DOJ
0.387 Find similar Compare side-by-side
209430 ARSTECHNICA 2021-6-7:
US seizes $2.3 million Colonial Pipeline paid to ransomware attackers
0.357 Find similar Compare side-by-side
209608 ZDNET 2021-6-7:
US Justice Department accuses Latvian national of deploying Trickbot malware
0.332 Find similar Compare side-by-side
209705 ZDNET 2021-6-11:
Card Broken: 1000 arrests made in Chinese crackdown on fraud, cryptocurrency laundering
0.332 Find similar Compare side-by-side
209673 ZDNET 2021-6-10:
Ransomware: Meat firm JBS says it paid out $11m after attack
0.330 Find similar Compare side-by-side
209589 TECHREPUBLIC 2021-6-8:
Feds recover $2.3 million in cryptocurrency paid by Colonial Pipeline in ransomware attack
0.329 Find similar Compare side-by-side
209769 ZDNET 2021-6-11:
DOJ charges cybersecurity official for attack on Georgia hospital
0.309 Find similar Compare side-by-side
209420 ZDNET 2021-6-9:
This new ransomware group claims to have breached over 30 organisations so far
0.309 Find similar Compare side-by-side
209834 ZDNET 2021-6-10:
This new hacking group has a nasty surprise for African, Middle East diplomats
0.302 Find similar Compare side-by-side
209443 ZDNET 2021-6-9:
Qrypt’s cloud service will distribute entropy for better cryptography
0.289 Find similar Compare side-by-side
209845 ZDNET 2021-6-11:
China passes new laws to hit back at foreign sanctions
0.289 Find similar Compare side-by-side
209839 ZDNET 2021-6-9:
Cryptojacking now added to list of cryptocurrency threats
0.285 Find similar Compare side-by-side
209572 VENTUREBEAT 2021-6-7:
Identity verification company Trulioo lands $394M
0.284 Find similar Compare side-by-side
210112 ZDNET 2021-6-12:
Avaddon ransomware group closes shop, sends all 2,934 decryption keys to BleepingComputer
0.282 Find similar Compare side-by-side
209624 ZDNET 2021-6-7:
The cost of ransomware attacks worldwide will go beyond $265 billion in the next decade
0.281 Find similar Compare side-by-side
209658 ZDNET 2021-6-8:
A deep dive into Nefilim, a ransomware group with an eye for $1bn+ revenue companies
0.279 Find similar Compare side-by-side
209380 ZDNET 2021-6-8:
Smartphones sales are finally booming, and Apple is all set to win big, say researchers
0.268 Find similar Compare side-by-side
209711 VENTUREBEAT 2021-6-9:
What the Supreme Court’s decision on federal computer crime law means to you
0.268 Find similar Compare side-by-side


ID: 209527


Date: 2021-06-09

FBI touts arrest of hundreds thanks to fake app

The FBI and law enforcement agencies in 16 other countries used a popular app to spy on criminal organizations. Law enforcement agencies in 17 different countries hailed a multinational effort to disrupt multiple criminal networks thanks to AN0M, a platform controlled by the FBI and loaded onto custom smartphones.  The smartphones were marketed in the criminal underworld and used widely among drug traffickers, weapons sellers, contract killers and more for about 18 months. Messages sent from the exclusive devices were fed back to an FBI database, the Justice Department explained during a press conference.  According to Europol, more than 12,000 devices were eventually disseminated to 300 criminal syndicates operating in more than 100 countries. Those who used the devices thought they were encrypted. The FBI kickstarted the effort in late 2018 when Phantom Secure CEO Vincent Ramos was arrested for creating and selling encrypted phones to criminal organizations.  The FBI used one of the brokers associated with Phantom Secure to market the new smartphones that were bugged and give them an air of legitimacy. According to court filings, other notable figures in the criminal underworld began to endorse the app because of its security features.  Law enforcement officials said more than 800 people had been arrested as a result of the operation and officials across multiple countries reported impounding 250 firearms, $48 million in cash and cryptocurrencies, eight tons of cocaine, two tons of methamphetamine and amphetamine, and 55 luxury vehicles. "We were actually able to see photographs of hundreds of tons of cocaine that were concealed in shipments of fruit," said Calvin Shivers, part of the FBI's Criminal Investigative Division.  Justice Department officials said the operation, called Trojan Shield in the US, disrupted South American cartels and gangs across Asia, Europe and the Middle East. But the majority of the 27 million messages sent on the app came from Spain, Australia, Germany, the Netherlands, and Serbia. In court filings, the FBI explained that they were able to funnel more criminals onto the app because they shut down other competitors like Sky Global and EncroChat. The app also was touted by well-known people like Hakan Ayik, one of the most wanted men in Australia.  Cybersecurity experts said this was not the first time the US law enforcement agencies ran an operation like this.  Rick Holland, CISO for Digital Shadows, said that in July 2017, Europol and the US Department of Justice ran Operation Bayonet, which involved the seizure of the most popular English language dark web market AlphaBay.  Cybercriminal buyers and sellers then flocked to an alternative market called Hansa, Holland explained, noting that the new users didn't know that the Dutch police had taken over the market. "For the next month, they collected intelligence and evidence on the criminal activities. International law enforcement was able to disrupt cybercrime," Holland said. "As is always the case after law enforcement actions, cybercrime finds a way. Other criminals and services rise from the ashes. " Tyler Shields, CMO at JupiterOne, said that it was the first time he had seen hardware devices being distributed and used to facilitate a man in the middle attack against more than 300 criminal organizations. "Typically, software-based attacks targeting a specific person or group of people are used. The fact that this targeted the entire underworld literally is of huge importance," Shields said.  Other experts said that while this was a positive development, criminal organizations managed to find new tools despite repeated disruptions. Lookout director of security intelligence research, Christoph Hebeisen, explained that EncroChat and Phantom Secure are just two examples of encrypted chat services popular with criminals that were eventually disrupted by law enforcement. " However, as we have seen in the past, the end of one encrypted chat service popular with criminals usually leads to a shift to a new one," Hebeisen added. "Since there has now been a string of such takedowns, each leading to a large number of arrests, criminals might become more careful. This could lead them to use legitimate end-to-end encrypted chat services where they can hide among innocent users."